Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Feb 2005 21:31:19 +0100
From:      Andy Hilker <ah@crypta.net>
To:        "Li, Qing" <qing.li@bluecoat.com>, freebsd-current@freebsd.org
Subject:   Re: known TCP vulnerability ??
Message-ID:  <20050211203119.GA76141@mail.crypta.net>
In-Reply-To: <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com>
References:  <00CDF9AA240E204FA6E923BD35BC64360879060E@bcs-mail.internal.cacheflow.com>

next in thread | previous in thread | raw e-mail | index | archive | help

Hi,

You (Li, Qing) wrote:
>
>       http://www.kb.cert.org/vuls/id/464113
>
>       http://www.linuxsecurity.com/content/view/104980/98/
>
>       Ran the packet tests against FreeBSD 5.3 and 6-CURRENT and both
>       respond to the SYN+FIN packets with SYN+ACK.


do you have 

"options         TCP_DROP_SYNFIN" 

in your kernel config?

bye,
Andy




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050211203119.GA76141>